標(biāo)題: Titlebook: Soft Computing and Signal Processing; Proceedings of ICSCS Jiacun Wang,G. Ram Mohana Reddy,V. Sivakumar Reddy Conference proceedings 2019 S [打印本頁(yè)] 作者: 次要 時(shí)間: 2025-3-21 18:55
書目名稱Soft Computing and Signal Processing影響因子(影響力)
書目名稱Soft Computing and Signal Processing影響因子(影響力)學(xué)科排名
書目名稱Soft Computing and Signal Processing網(wǎng)絡(luò)公開(kāi)度
書目名稱Soft Computing and Signal Processing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Soft Computing and Signal Processing被引頻次
書目名稱Soft Computing and Signal Processing被引頻次學(xué)科排名
書目名稱Soft Computing and Signal Processing年度引用
書目名稱Soft Computing and Signal Processing年度引用學(xué)科排名
書目名稱Soft Computing and Signal Processing讀者反饋
書目名稱Soft Computing and Signal Processing讀者反饋學(xué)科排名
作者: DEMUR 時(shí)間: 2025-3-21 23:16 作者: FATAL 時(shí)間: 2025-3-22 01:56 作者: 未開(kāi)化 時(shí)間: 2025-3-22 07:06 作者: Perineum 時(shí)間: 2025-3-22 08:45
Soft Computing and Signal Processing978-981-13-3600-3Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: Incorruptible 時(shí)間: 2025-3-22 13:59
Jiacun Wang,G. Ram Mohana Reddy,V. Sivakumar ReddyProvides information on a wide set of topics in soft computing and signal processing.Is useful for academicians as well as researchers looking for current developments and future trends.Contributes to作者: 類型 時(shí)間: 2025-3-22 19:09 作者: 商業(yè)上 時(shí)間: 2025-3-23 01:05 作者: palliative-care 時(shí)間: 2025-3-23 04:22
White Blood Cell Classification Using Convolutional Neural Network,d selection and an automated classification using microscopic blood smear images. In this work, we propose deep learning methodology to automate the entire process using convolutional neural networks for a binary class with an accuracy of 96% as well as multiclass classification with an accuracy of 87%.作者: 種子 時(shí)間: 2025-3-23 06:29 作者: dendrites 時(shí)間: 2025-3-23 11:05 作者: 鎮(zhèn)壓 時(shí)間: 2025-3-23 16:16
Initial Centroids for K-Means Using Nearest Neighbors and Feature Means,t clustering results for different runs. The algorithm converges to local optima based on the initial centroids chosen and does not guarantee reaching the global optima. This paper proposes an algorithm for choosing the initial centroids where each initial centroid is determined using the feature me作者: 用不完 時(shí)間: 2025-3-23 19:57 作者: 多產(chǎn)魚 時(shí)間: 2025-3-24 01:48
A Comparative Analysis of Unequal Clustering-Based Routing Protocol in WSNs,cy. Clustering improved energy efficiency, but it causes hotspot problem. To eliminate this hotspot problem, unequal clustering approach is proposed. In this approach, clusters of different sizes are formed. The objective of enhancing the network lifetime can be achieved in a better way via unequal 作者: 殖民地 時(shí)間: 2025-3-24 03:06 作者: 愛(ài)得痛了 時(shí)間: 2025-3-24 07:41
Diet Recommendation to Respiratory Disease Patient Using Decision-Making Approach,lmonary disease (COPD), asthma, occupational lung diseases and pulmonary hypertension. Diet is one of the best things by which we can cure any type of disease. Diet plays an important role in preventing and making the disease cure. In respiratory disease, mostly the patient does not follow the diet 作者: muffler 時(shí)間: 2025-3-24 13:07
Detection of False Positive Situation in Review Mining,s are totally dependent upon those reviews given by customers with the experience they felt and makers depend on these user-generated reviews to apprehend the sentiments of users related to a product. Henceforth, it is mandatory for both makers and users to create a portal where customers can peruse作者: 煩躁的女人 時(shí)間: 2025-3-24 15:25 作者: 表否定 時(shí)間: 2025-3-24 20:31 作者: GONG 時(shí)間: 2025-3-25 00:35 作者: Monocle 時(shí)間: 2025-3-25 06:01 作者: LUT 時(shí)間: 2025-3-25 11:06 作者: Dendritic-Cells 時(shí)間: 2025-3-25 14:20 作者: Graves’-disease 時(shí)間: 2025-3-25 19:11
Payment Security Mechanism of Intelligent Mobile Terminal, terminals are no longer just communication functions, but also related to our family life, such as smart home and smart cars. With the powerful function of intelligent mobile terminals, people pay more and more attention to mobile payment business because of its convenient and fast service, and the作者: 嘮叨 時(shí)間: 2025-3-25 23:34
Hybrid Neuro-fuzzy Method for Data Analysis of Brain Activity Using EEG Signals,tive of this paper is to propose an efficient EEG classification scheme designed for a medical environment. The proposed system is able to predict the state of mind of a disabled person. The data of the disabled person is fed as input to this proposed system. The next part of this system is based on作者: Popcorn 時(shí)間: 2025-3-26 04:01
Gait Recognition Using J48-Based Identification with Knee Joint Movements,The proposed model allows recognizing the subjects based on their gait. When a subject walks, a unique angle is created at his knee joint. Classifying the subject with the help of his knee angle enables unique recognition. The model is designed, developed, and tested in WEKA considering the paramete作者: Fibrillation 時(shí)間: 2025-3-26 07:30
Cyber Intelligence Alternatives to Offset Online Sedition by in-Website Image Analysis Through WebCto the Culprit organization Government of Telangana (CGoT) that has been purportedly prevalent during 2011–2015 approximately as indicated in the website home page image of .. Interestingly, the crime is registered against identity theft under Section?66-C under IT Act 2000–2008, whereas the complai作者: kyphoplasty 時(shí)間: 2025-3-26 12:27
Deep Convolutional Neural Network-Based Diabetic Retinopathy Detection in Digital Fundus Images, timely detection of the initial symptoms of DR, namely microaneurysms and hemorrhages, are important to reduce the possibility of vision impairment. The proposed work explores the power of Convolutional Neural Network (CNN) in the analysis and detection of retinal disorders. An automated deep learn作者: 隱語(yǔ) 時(shí)間: 2025-3-26 16:22 作者: 編輯才信任 時(shí)間: 2025-3-26 18:06 作者: Flu表流動(dòng) 時(shí)間: 2025-3-27 00:54
Blockchain Technology for Decentralized Data Storage on P2P Network,ms such as bandwidth stealing and throttling; additionally, it will lower the latency of data retrieved as the peer will be in proximity to the user. Using blockchain P2P system, it opens a whole new world of possibilities for a new Internet.作者: mitten 時(shí)間: 2025-3-27 03:36
A Machine Learning Approach for Web Intrusion Detection: MAMLS Perspective,s used in this study. Experimental results indicate that SVM and LR have been superior in their performance than their counterparts. Predictive workflows have been created using Microsoft Azure Machine Learning Studio (MAMLS), a scalable machine learning platform which facilitates an integrated development environment to data scientists.作者: Outspoken 時(shí)間: 2025-3-27 08:04 作者: commune 時(shí)間: 2025-3-27 10:21 作者: resuscitation 時(shí)間: 2025-3-27 13:37 作者: osteocytes 時(shí)間: 2025-3-27 19:18 作者: 靦腆 時(shí)間: 2025-3-28 01:29 作者: Vldl379 時(shí)間: 2025-3-28 04:57 作者: 珊瑚 時(shí)間: 2025-3-28 09:24 作者: Alpha-Cells 時(shí)間: 2025-3-28 13:26
Gait Recognition Using J48-Based Identification with Knee Joint Movements,rs .-axis, .-axis, .-axis, and knee angle for the recognition of gait. Acceleration data is received from integrated sensor of cell phone placed in a front pocket of right leg’s trouser of the subject. Data is then analyzed and with the involvement of total 41 volunteers over 18–30?years old in the experiment, we achieved accuracy of 89.45%.作者: 通知 時(shí)間: 2025-3-28 16:15 作者: notion 時(shí)間: 2025-3-28 22:26
Optimization of Cloud Datacenter Using Heuristic Strategic Approach,system by maximizing the CPU utilization, reducing the turnaround time, and maximizing throughput. Tasks are statically scheduled based on which different available resources are allocated at compile time or dynamically. The prime objective for scheduling of task approach in the cloud is to minimize作者: 四溢 時(shí)間: 2025-3-28 23:08 作者: 悲觀 時(shí)間: 2025-3-29 05:41
Payment Security Mechanism of Intelligent Mobile Terminal,ion software signature verification measures, and unauthorized application software can be installed properly, and there may be malicious software containing virus. Therefore, the design of a highly secure and customized Android intelligent payment terminal has become a common concern in the field o作者: Water-Brash 時(shí)間: 2025-3-29 07:16
Hybrid Neuro-fuzzy Method for Data Analysis of Brain Activity Using EEG Signals,ural network is also an excellent classification approach, fuzzy logic provides effective knowledge for the problems need to be solved at the approximation level. However, independent solution approach using fuzzy logic is not appropriate as this technique is applied at the approximation level. Also作者: Mri485 時(shí)間: 2025-3-29 15:03
Cyber Intelligence Alternatives to Offset Online Sedition by in-Website Image Analysis Through WebCany facets of the moot cybercrime issues related to the JNTUH University academic environment and how they are handled. The crime is on account of the abusive usage of an image in the home page of the aforementioned website. The image usage is nationally abusive during 2011–14 because of the mention作者: NICE 時(shí)間: 2025-3-29 16:51 作者: 不連貫 時(shí)間: 2025-3-29 22:02
Yadala Sucharitha,Y. Vijayalata,V. Kamakshi Prasad作者: 無(wú)禮回復(fù) 時(shí)間: 2025-3-30 01:02
Muddana A. Lakshmi,Gera Victor Daniel,D. Srinivasa Rao作者: Pillory 時(shí)間: 2025-3-30 07:09
Tanmay Biswas,Sushil Kumar,Tapaswini Singh,Kapil Gupta,Deepika Saxena作者: 朦朧 時(shí)間: 2025-3-30 11:26 作者: Cursory 時(shí)間: 2025-3-30 15:03
G. Maria Jones,S. Godfrey Winster,S. V. N. Santhosh Kumar作者: 抗原 時(shí)間: 2025-3-30 20:23
N. Santhoshi,K. Chandra Sekharaiah,K. Madan Mohan,S. Ravi Kumar,B. Malathi作者: 施舍 時(shí)間: 2025-3-30 21:28
S. Saranya Rubini,R. Saai Nithil,A. Kunthavai,Ashish Sharma作者: Seizure 時(shí)間: 2025-3-31 03:58 作者: 反話 時(shí)間: 2025-3-31 08:51
Prashant Gaurav,Sanjay Kumar Dubeyodeling and implementation, and as a reference for practitioners needing a stable and scalable tool for industrial applications. FeatureIDE is the most used open-source tool for feature modeling and has been continuously improved since 2004. The success of FeatureIDE is due to being a vehicle for cu作者: 令人心醉 時(shí)間: 2025-3-31 10:48 作者: Commentary 時(shí)間: 2025-3-31 15:01 作者: Inculcate 時(shí)間: 2025-3-31 21:29 作者: Factorable 時(shí)間: 2025-3-31 22:29
Ganpat Singh Chauhan,Yogesh Kumar Meenarn how to analyze domains using feature models, specify requirements in form of configurations, and how to generate code based on conditional compilation and feature-oriented programming. Given the interactive style of the book, readers can directly try out the open-source development environment. A作者: 高興去去 時(shí)間: 2025-4-1 04:41